mthbernardes / QMKhuehuebrLinks
Trying to hack into keyboards
☆86Updated 6 years ago
Alternatives and similar repositories for QMKhuehuebr
Users that are interested in QMKhuehuebr are comparing it to the libraries listed below
Sorting:
- A shellcode testing harness.☆69Updated 11 months ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆38Updated 6 years ago
- Red Team Resources☆60Updated 6 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated last month
- ☆24Updated 9 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- Some simple go tools to perform a Man-in-the-middle (MITM) attack on your IMAP server in case you forgot your password.☆65Updated 6 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- PLASMA PULSAR☆69Updated 8 years ago
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 6 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- Reflective Polymorphism☆104Updated 6 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- The Alternative Fileless File System☆57Updated 6 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆85Updated 5 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 3 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 7 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 6 years ago
- Another Repo of Malware. Enjoy. <3☆59Updated 6 years ago
- exploit for CVE-2018-4193☆70Updated 6 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago